09 Flashcards
______ is an open standard protocol for accessing object-oriented databases, known as Directory servers
port _____
LDAP
389
The ______ model is based on the structure of the directory
- the structure of a directory:
________ most fundamental item in a directory; these are items such as users, groups and computers.
_________ charecteristics of objects
_________ set of rules or structure that efines objects
_________ logical grouping of objects or type of class object (by organizational structure, groups, etc)
______________ used for organizing objects, unable to link group policies directly to them
___________ used for organizng objects and able to link group policies to them.
_________ contains OUs, containers, and objects and provides the ability to link a group policy to them as a single entity
___________ may be used as user logon name for the domain. combines usernames and DNS name; commonly used as an email address.
information
object
attribute
Schema
Classes
Container
Organizational unit (OU)
Domaions
User Principal name (UPN)
The ______ model deals with organization of the data and objects within a database.
What are the two names used to reference an object in a directory/domain?
_______________ ________ contains the relative distinguished name and location within the LDAP directory
_________________ _______ portion of the name that does not realte to the directory structure. It is unique to each level
The LDAP standard __________ defines classes of objects
Naming
Distinguished name Full name
Relative distinguished name Common name
RFC-1777
What are the object class identifiers that active directory uses?
___ Users, groups, computers, printers, containers, etc
___ Organizational unit object class
___ domainDns object class; identifies the domain name Hierarchy
CN
OU
DC
Every directory object has an LDAP DN, which indicates the object’s full path. Active directory uses DN to allow clients to retrieve directory information T/F?
T
The ____________ model provides information that details what actions are allowed with the database
___________ Operations are for initiating and authenticating a session to the LDAP server. The primary operation performed is ______
___________ how the database or directory is searched. ________ is the primary operation
________ used for data modification including add, modify, and delete
Functional
Authentication, bind
Interrogation, Search
Update
_____________ is Microsoft’s implementation of LDAP directory services.
What are the benefits of it?
FIEP SRSI
Active Directory
Flexible querying
Intergration with DNS
Extensibility
Policy-based administration
Scalability
Replication
Security
Interoperability
Where is active directory contained?
\Windows\NTDS\Ntds.dit
A Domain name server running a server OS that does not have AD installed is referred to as a _________________
____________ server as boundaries for authentication and policy and must have a unique namespace
A server OS with active directory installed is called a ____________
Member Server
Domain
Domain Controller
_______ are used to represent the physical topology of the network, used to configure and optimize replication between physically dispersed domain cointrollers.
What are the three benefits of this?
SNP
sites
Enables clients to effectively discover services
Enables network traffic control tp optmize replication between domain controllers and maximize data avaliability
Enables policy application; Group Policy Objects may be linked to sites.
A _________ is one or more domains sharing a common schema, where the first domain created is the forests root domain
A ________ consists of one or more domains that may be grouped together to form hierarchical structures
Forest
Tree
A _________ is a relationship established between domains to enable users in one domain to access resources in another domain
trust
What are the two different types of trusts?
________ ________ When domain A trusts domain B and domain B trusts domain C, then memebers of A have access to resources in C if they have the correct permissions. Configured between parent/child domains and between root domains in a forest
_______ ________ _______ Between two forests, manually created
_______ Between two distant child domains; used to
improve logon.
________ Access between two active directory
domains located in different forests (no
forest trust exists)
Transitive Trust Automatic
Non-transitive Trusts External trusts configured manually
Forest
Shortcut
External
Within a Forest-wide query ______ is used to search for resources. It does this with its implementation in a domain controller and uses ______________ to identify those resources.
it uses ports ________ and __________
GC Global catalog
DN Distinguished Names
TCP 3268 or 3269 (SSL)
What ports does PS use for communication?
__________ = HTTP
_________ = HTTPS
TCP/5985
TCP/5986